Using PSO in a spatial domain based image hiding scheme with distortion tolerance
With tremendous advancement in digital technology, efficient steganography techniques are
needed for the security and copyright protection of digital information being transmitted over …
needed for the security and copyright protection of digital information being transmitted over …
[PDF][PDF] A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
Least Significant Bit (LSB) technique is the earliest developed technique in watermarking
and it is also the most simple, direct and common technique. It essentially involves …
and it is also the most simple, direct and common technique. It essentially involves …
Robust medical image authentication using 2-D stationary wavelet transform and edge detection
Watermarking is a data authentication technique which embeds the watermark data within
the original image in order to claim for copyright protection. Watermark techniques must be …
the original image in order to claim for copyright protection. Watermark techniques must be …
An intermediate significant bit (ISB) watermarking technique using neural networks
Prior research studies have shown that the peak signal to noise ratio (PSNR) is the most
frequent watermarked image quality metric that is used for determining the levels of strength …
frequent watermarked image quality metric that is used for determining the levels of strength …
Reversible color image watermarking using trigonometric functions
S Chakraborty, P Maji, AK Pal… - … on Electronic Systems …, 2014 - ieeexplore.ieee.org
In this present work, we propose a new reversible color image watermarking technique,
using trigonometric functions. The proposed method embeds secret bits into the gray planes …
using trigonometric functions. The proposed method embeds secret bits into the gray planes …
Robust image watermarking based on dual intermediate significant bit (DISB)
GN Mohammed, A Yasin… - 2014 6th International …, 2014 - ieeexplore.ieee.org
The most important requirements should be available on any watermarking systems which
are the robustness against possible attacks and the quality of the watermarked images. In …
are the robustness against possible attacks and the quality of the watermarked images. In …
[PDF][PDF] Sistem Legalisir Scan Ijasah Online Berbasis QR Code dan Watermarking
Dokumen ijasah memiliki arti penting bagi pemiliknya sebagai bukti seseorang telah
menyelesaikan satu tahap studi yang ditempuh. Ijasah juga termasuk syarat utama ketika …
menyelesaikan satu tahap studi yang ditempuh. Ijasah juga termasuk syarat utama ketika …
A blind chaos‐based watermarking technique
This paper presents a robust blind frequency domain watermarking scheme based on
chaotic maps. The proposed scheme embeds a black and white watermark logo in the …
chaotic maps. The proposed scheme embeds a black and white watermark logo in the …
A Fibonacci LSB data hiding tecnique
DDL Picione, F Battisti, M Carli, J Astola… - 2006 14th European …, 2006 - ieeexplore.ieee.org
In this paper, a novel data-hiding technique based on the Fibonacci representation of digital
images is presented. A generalization of the classical Least Significant Bit (LSB) embedding …
images is presented. A generalization of the classical Least Significant Bit (LSB) embedding …
An IWT based blind and robust image watermarking scheme using secret key matrix
In this paper, the authors have proposed a binary watermark embedding approach for
protecting the copyright ownership of the gray-scale images. The proposed watermark …
protecting the copyright ownership of the gray-scale images. The proposed watermark …